Application Security library
☆11Nov 6, 2012Updated 13 years ago
Alternatives and similar repositories for Application_Security
Users that are interested in Application_Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Nintendo 3DS exploit for CTRSDK CTPK.☆11Jan 9, 2017Updated 9 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Windows过滤驱动-helloworld☆24Aug 27, 2015Updated 10 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Reverse Engineering of NVIDIA's Tegra driver for Linux☆36Jul 17, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Oct 25, 2015Updated 10 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- Use recommendation inputs to modify terraform☆18Jun 17, 2019Updated 6 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆47Nov 9, 2014Updated 11 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- Collection Of Anti-Debugging Tricks☆100Dec 19, 2015Updated 10 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago